recommended reading

special report

White House's Digital Strategy

The Obama administration's digital strategy, titled “Building a 21st Century Platform to Better Serve the American People,” aims to ensure agencies manage mobile devices safely and affordably and to give citizens mobile access to everything from government websites and applications to raw survey and satellite data.

White House photo

Pete Seeger’s digital legacy and other tech news

October 10, 2012 Maps move to high security clouds; GSA pushes Web analytics.

Government Printing Office adopts internal XML system

September 12, 2012 New format will make it easier to launch apps and e-books, CTO says.

Does the Federal CIO Shop Need Bold Vision or Implementation?

September 12, 2012 VanRoekel didn’t just stick with his predecessor’s plan, he added his own initiatives.

Agencies should publish lists of all their data, group says

July 3, 2012 Sunlight Foundation is developing a best practices guide for government transparency.

IG finds unauthorized e-readers, thumb drives, GPS on Homeland Security networks

June 28, 2012 The department does not consistently encrypt sensitive data stored on mobile devices.

Digital strategy group works on 'bring your own device' guidelines

June 22, 2012 Federal CIO also launches an innovation center to share digital best practices.

Agency-owned PCs could soon be relics of a bygone era

June 22, 2012 Veterans Affairs Department CIO Roger Baker predicts employees will have to buy their own computers for work in the near future.

Pentagon’s blueprint for mobile devices lacks security details

June 15, 2012 Strategy offers little guidance for securing specific smartphones and tablets.

White House issues guidance on modular IT development

June 15, 2012 New approach aims to reduce cost and schedule overruns.

Security presented as the foundation of new federal digital strategy

May 25, 2012 A blueprint for moving government services to mobile devices concentrates on protecting data, rather than the devices.

White House launches federal digital strategy

May 23, 2012 Plan aims to make government info mobile friendly.

USDA slashed its mobile phone bill $400,000 per month

March 29, 2012 Agriculture consolidated 700 service plans into 10, saving 20 percent in mobile contracts.

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.